Sciweavers

3420 search results - page 134 / 684
» A Language-Based Approach to Security
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
WETICE
2003
IEEE
15 years 9 months ago
Software Security Checklist for the Software Life Cycle
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
137
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Security Services in an Open Service Environment
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Reiner Sailer
ISI
2006
Springer
15 years 3 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
DAC
2007
ACM
16 years 4 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf